 |
|
|
|
 Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael
Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web
reports, (before the term "Bl" came to embody what at the time we thought was an incredibly
innovative way to display call center metrics for managing... |  |  Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in
modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals
wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was
a later version of the term,... |  |  |
|
 |  |  Optimization for Machine Learning (Neural Information Processing series)
The intersection of interests between machine learning and optimization
has engaged many leading researchers in both communities for some years
now. Both are vital and growing fields, and the areas of shared interest are
expanding too. This volume collects contributions from many researchers
who have been a part of these... |  |  |
|
| Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 |